picked this up off http://diggdot.us

http://www.eweek.com/article2/0,1895,1936666,00.asp

It sounds disturbingly thourough, basically it exploits known flaws to
let an attacker run a virtual machine monitor which then runs the
original operating system as one of several partitions.

Think Xen or VMWare installed without your knowledge and running your
OS and apps just as before, you might notice a little network slowdown
while your parasite launches a spam run or bittorrents someone's
credit card database to their pals, but from within the OS you won't
be able to tell...

<snark>Yikes! Heavens to Betsy! We're Doomed I tell you Dooooooomed.</snark>

It is a product of microsoft research, and they pointedly mention that
both Windows and Linux were used as practice targets...
Any bets on how long before this hits the wild...

And installation is utterly undetectible, right?

Doomed I tell you.
--
http://Zoneverte.org -- information explained
Do you know what your IT infrastructure does?
_______________________________________________
EUGLUG mailing list
[email protected]
http://www.euglug.org/mailman/listinfo/euglug

Reply via email to